If the server security is so weak that someone can take advantage of it by looking at your client-side code
it's the server security that you should be spending your time worrying about
Security through obscurity (or obfuscation) is no real security at all.
Well anyone that wants to get passed your security with JavaScript just has to disable JavaScript and all the validations and checks are no longer valid.
Anyone with a small bit of JS knowledge of debugging can get the code since it has to be de-obfuscated for the browser to read it.
Not to be snide, but I find your question amusing in the light of your signature:
Like me, don't worry about it. I minimize for footprint rather than for obfuscation.
Use an obfuscating minimizer -- I've used Yahoo's in the past with success.
reading it again, I see that there are two columns and you want asignadoOrigen and asignadoDestino to both map to idAsignado in the Asignado table. This is still a problem because you have defined A OneToOne relationship between Asignado and TraspasoAsignado entities. idAsignado cannot be two different values at once.